Blocking smtp auth attempts

Splet

Verified User
Joined
Oct 17, 2007
Messages
40
We're seeing hundreds of these (example below) each hour, looks like botnets guessing the passwords. They have many zombies, since IPs rarely repeat and lfd is not blocking them.
What I notice is most of the IPs are on SpamHaus XBL or SBL, but exim is only blocking them if they try to send an email. Is there a way to check the IP against SpamHaus for these login attempts, too?

2023-03-19 08:01:09 login authenticator failed for (ADMIN) [103.187.4.x]: 535 Incorrect authentication data (set_id=uros@...)
2023-03-19 08:01:11 login authenticator failed for ([185.245.40.x]) [185.245.40.x]: 535 Incorrect authentication data (set_id=frank)
...
 
you can configure csf to block after failed attempts more hard.
by default it blocks after 5 or 10 attempts during 1h (depends on service) you can configure to block for example after 3 attempts during 8h.
 
Thanks, will try those lists, hope it doesn't overburden my ipset. I'll match IPs with those and see which matches most of them.

Botnet IPs don't repeat often, some even for days, so LFD tightening would block some legit users, too.
 
For the record, you should NOT block AUTH based on RBL's that are designed for stopping spam. For instance, a dynamic IP, or a carrier grade NAT IP might be on an RBL, since they should not have an email server on that IP, and might have 'bots' on it, but that IP also has legitimate email clients trying to access their email. Think your local coffeeshop which might be on lots of DUL based RBL's. Now, there ARE some RBL's that are designed to stop AUTH attacks from obvious bad sourced (eg SpamRats RATS-AUTH or RATS-NULL) but auth sources is a multi-level approach. Generally you WANT connections from DUL networks to AUTH. But you don't expect random servers on Digital Ocean, AWS, Google Cloud, to authenticate against you email. You might like to look at country auth blocking, cloud blocking, etc.. (BTW, #blowingownhorn) MagicSpam comes with all these things built in. However, right now with Marai bots, and others running full bore, you can expect that over 75% of all all authentication attempts will be BOTS, from the same IPs you expect legitimate traffic (Bots on Windows, Bots on GPON Routers).

In the end, using proper 2FA is the only long term solution, and some traffic will always be 'noise' in your logs.

But make sure you have REALLY good detection systems, including Rate Limiters and other tools to detect any compromised attacks as well.
Customer will ALWAYS be vulnerable to 'phishing' or password re-use problems.

Oh, and final word.. watch out for AUTH attacks via VPN's and open Proxies. Hackers in foreign countries use that to get around country blocking for attacks not only for watching Netflix.
 
Back
Top